Skip to main content

IBM Security Redbooks

 

Detect, prioritize, address,
and help prevent security breaches

 
thumb

23 February 2024

IBM Hyper Protect Platform: Applying Data Protection and Confidentiality in a Hybrid Cloud Environment

Protecting workloads and sensitive data throughout their lifecycle is a great concern across all industries and organizations. Increasing demands to accelerate hybrid cloud adoption and integration are changing the way data is securely stored, …

Read now
thumb

25 April 2023

Security Implementation with Red Hat OpenShift on IBM Power Systems

Red Hat OpenShift is a powerful and flexible container orchestration platform that enables organizations to build, deploy, and manage applications in a cloud-native environment. As with any production system, you must ensure the security of an Red …

Read now
thumb

14 April 2022

IBM Power Systems Cloud Security Guide: Protect IT Infrastructure In All Layers

This IBM® Redpaper publication provides a security and compliance solution that is optimized for on-premises and cloud-virtualized environments on IBM Power Systems servers, running IBM AIX®, IBM i and Linux. Security control and compliance are some …

Read now


IBM Hyper Protect Platform: Applying Data Protection and Confidentiality in a Hybrid Cloud Environment

23 February 2024, Redbooks

Protecting workloads and sensitive data throughout their lifecycle is a great concern across all industries and organizations. Increasing demands to accelerate hybrid cloud adoption and integration are changing the way data is securely stored, processed, and accessed. In addition, regulatory guidelines and standards are causing many businesses and organizations to implement zero trust ...


Security Implementation with Red Hat OpenShift on IBM Power Systems

25 April 2023, Redpaper

Red Hat OpenShift is a powerful and flexible container orchestration platform that enables organizations to build, deploy, and manage applications in a cloud-native environment. As with any production system, you must ensure the security of an Red Hat OpenShift deployment, which includes secure deployment and configuration of the Red Hat OpenShift components, and ongoing maintenance and ...


IBM Power Systems Cloud Security Guide: Protect IT Infrastructure In All Layers

14 April 2022, Redpaper

This IBM® Redpaper publication provides a security and compliance solution that is optimized for on-premises and cloud-virtualized environments on IBM Power Systems servers, running IBM AIX®, IBM i and Linux. Security control and compliance are some of the key components that are needed to defend the virtualized data center and cloud infrastructure against ever evolving threats. The IBM ...


Securing Data on Threat Detection by Using IBM Spectrum Scale and IBM QRadar: An Enhanced Cyber Resiliency Solution

13 September 2021, Redpaper

Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detection, and prioritization of threats has become a necessity for any business. This IBM® Redpaper publication explains how the storage features of IBM Spectrum® Scale, when combined with the log analysis, deep inspection, and detection of ...


Enabling IBM Cloud Pak for Multicloud Management to Connect Kubernetes Clusters Using IBM Secure Gateway

20 November 2020, Redpaper

In today’s dynamically changing IT landscape, it is highly likely that a company’s cloud strategy spans multiple cloud providers. Such a span is known as the hydrid multi-cloud landscape. The challenges that quickly surface in an IT department’s list of responsibilities now encompass managing environments that are running on multiple cloud providers. The traditional IT administrators find ...


Maximizing Security with LinuxONE

10 August 2020, Redpaper

LinuxONE® is a hardware system that is designed to support and use the Linux operating system based on the value of its unique underlying architecture. LinuxONE can be used within a private and multi-cloud environment to support a range of workloads and service various needs. On LinuxONE, security is built into the hardware and software. This IBM® Redpaper® publication gives a broad ...


Security in Development: The IBM Secure Engineering Framework

17 December 2018, Redpaper

IBM® has long been recognized as a leading provider of hardware, software, and services that are of the highest quality, reliability, function, and integrity. IBM products and services are used around the world by people and organizations with mission-critical demands for high performance, high stress tolerance, high availability, and high security. As a testament to this long-standing ...


Managing Digital Certificates across the Enterprise

24 August 2018, Redbooks

This IBM® Redbooks® publication is the first in a series of five books that relate to the implementation and management of digital certificates that are based on a public key infrastructure. Digital certificates play a major role in the protection of data communications and their use continues to grow. This Redbooks publication includes the following chapters: - Chapter 1, “Digital ...


Developing a Blockchain Business Network with Hyperledger Composer using the IBM Blockchain Platform Starter Plan

30 May 2018, Redpaper

Blockchain has emerged as a disruptive technology in the areas of trading assets and sharing information. It has the capability to transform many industries, professions, and aspects of life. The focus of this IBM® Redbooks® publication is to help developers build blockchain solutions and use IBM Blockchain Platform to start, test, and move applications into production. This publication covers ...


Protecting the VMware Environment with IBM Spectrum Protect

08 January 2018, Redpaper

While backup is a topic of much discussion, development, and strategy, the name of the game is rapid recovery. Given the explosive growth of data in our Client environments, there is a need to provide solutions to our Clients that meet their recovery time objective and recovery point objective needs. Traditional backups of files, databases, and similar objects sent across networks (LAN or SAN) ...

 
1–10 of 16 items
of 2 pages